CVE-2025-62001

BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*

History

15 Jan 2026, 20:16

Type Values Removed Values Added
Summary (en) BullWall Ransomware Containment supports configurable file and directory exclusions such as '$recycle.bin' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker with file-write permissions to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which removes hardcoded exclusion behavior and exposes exclusion handling as configurable settings. (en) BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.

14 Jan 2026, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json', 'tags': ['Broken Link'], 'source': '9119a7d8-5eab-497f-8521-727c672e3725'}
  • () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json - Broken Link
Summary (en) BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. (en) BullWall Ransomware Containment supports configurable file and directory exclusions such as '$recycle.bin' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker with file-write permissions to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which removes hardcoded exclusion behavior and exposes exclusion handling as configurable settings.

12 Jan 2026, 17:14

Type Values Removed Values Added
First Time Bullwall ransomware Containment
Bullwall
CPE cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2025-62001 - () https://www.cve.org/CVERecord?id=CVE-2025-62001 - Third Party Advisory

18 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 21:15

Updated : 2026-01-15 20:16


NVD link : CVE-2025-62001

Mitre link : CVE-2025-62001

CVE.ORG link : CVE-2025-62001


JSON object : View

Products Affected

bullwall

  • ransomware_containment
CWE
CWE-420

Unprotected Alternate Channel